Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Control de Acceso")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 460

  • Page / 19
Export

Selection :

  • and

Architecting a Cloud-Scale Identity Fabric : CLOUD COMPUTINGOLDEN, Eric.Computer (Long Beach, CA). 2011, Vol 44, Num 3, pp 52-59, issn 0018-9162, 8 p.Article

Rethinking PasswordsCHESWICK, William.Communications of the ACM. 2013, Vol 56, Num 2, pp 40-44, issn 0001-0782, 5 p.Article

Federated Identity Management: We Built It; Why Won't They Come? : Technology TransferJENSEN, Jostein; GILJE JAATUN, Martin.IEEE security & privacy. 2013, Vol 11, Num 2, pp 34-41, issn 1540-7993, 8 p.Article

A review of GENI authentication and access control mechanismsZHIFENG XIAO; BO FU; YANG XIAO et al.International journal of security and networks (Print). 2013, Vol 8, Num 1, pp 40-60, issn 1747-8405, 21 p.Article

Open Sesame: Design Guidelines for Invisible Passwords : Interaction Beyond the KeyboardBIANCHI, Andrea; OAKLEY, Ian; KWON, Dong-Soo et al.Computer (Long Beach, CA). 2012, Vol 45, Num 4, pp 58-65, issn 0018-9162, 8 p.Article

Are Password Requirements too Difficult?SCHAFFER, Kim.Computer (Long Beach, CA). 2011, Vol 44, Num 12, pp 90-92, issn 0018-9162, 3 p.Article

Spécification et gestion des obligations pour le besoin de contrôle d'usage (un aperçu)CUPPENS, Frédéric; CUPPENS-BOULAHIA, Nora.Génie logiciel (1995). 2010, Num 94, issn 1265-1397, 2-5, 11 [5 p.]Conference Paper

AMTRAC: An administrative model for temporal role-based access controlSHARMA, Manisha; SURAL, Shamik; VAIDYA, Jaideep et al.Computers & security. 2013, Vol 39, pp 201-218, issn 0167-4048, 18 p., bArticle

Multiparty Simultaneous Quantum Identity Authentication Secure against Fake Signal Attacks : Cryptography and Information SecurityWASEDA, Atsushi.IEICE transactions on fundamentals of electronics, communications and computer science. 2013, Vol 96, Num 1, pp 166-170, issn 0916-8508, 5 p.Article

Why STM Can Be More Than A Research ToyDRAGOJEVIC, Aleksandar; FELBER, Pascal; GRAMOLI, Vincent et al.Communications of the ACM. 2011, Vol 54, Num 4, pp 70-77, issn 0001-0782, 8 p.Article

A first step towards automated permission-enforcement analysis of the Android frameworkSHIN, Wook; KIYOMOTO, Shinsaku; FUKUSHIMA, Kazuhide et al.Security & management. International conferenceWorldComp'2010. 2010, pp 323-329, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 7 p.Conference Paper

Static and Dynamic Delegation in the Role Graph ModelHE WANG; OSBORN, Sylvia L.IEEE transactions on knowledge and data engineering. 2011, Vol 23, Num 10, pp 1569-1582, issn 1041-4347, 14 p.Article

Design and Implementation of GUISET-Driven Authentication FrameworkEKABUA; OBETEN, O; ADIGUN et al.Grid computing & applications. International conferenceWorldComp'2011. 2011, pp 14-20, isbn 1-60132-181-3, 7 p.Conference Paper

Easing Text-based Mobile Device User Authentication MechanismsHUTCHINGS, Dugald Ralph.Security & management. International conferenceWorldComp'2011. 2011, pp 143-149, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 7 p.Conference Paper

Quantifying the Role of Access Control in End-to-End Network SecurityUSAMA AHMED, A; AMMAR MASOOD, B; LIAQUAT ALI KHAN, C et al.Security & management. International conferenceWorldComp'2011. 2011, pp 708-713, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 6 p.Conference Paper

The Knowledge Based Authentication AttacksTOWHIDI, Farnaz; ABDUL MANAF, Azizah; MOHD DAUD, Salwani et al.Security & management. International conferenceWorldComp'2011. 2011, pp 649-653, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 5 p.Conference Paper

Improving Transaction Success Rate by Detecting and Correcting Access Control MisconfigurationsMUKKAMALA, R; TAPDE, B.Security & management. International conferenceWorldComp'2010. 2010, pp 16-22, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 7 p.Conference Paper

Password Hardening Using Keystroke DynamicsANSAB IJAZ, A; ARSLAN JAVED, B; SAAD AMAN CHAUDHRY, C et al.Security & management. International conferenceWorldComp'2010. 2010, pp 229-233, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 5 p.Conference Paper

iOS Data Recovery Using Low-Level NAND Images : Identity IntegrityQIU, Wei-Dong; QIAN SU; LIU, Bo-Zhong et al.IEEE security & privacy. 2013, Vol 11, Num 5, pp 49-55, issn 1540-7993, 7 p.Article

A User-Activity-Centric Framework for Access Control in Online Social NetworksPARK, Jaehong; SANDHU, Ravi; YUAN CHENG et al.IEEE internet computing. 2011, Vol 15, Num 5, pp 62-65, issn 1089-7801, 4 p.Article

Integrating biometric and RFID autoID technologies: Excellent synergy in a real implementationMONTES, B; DE LA FUENTE, D; GARCIA, S et al.Artificial intelligence. International conferenceWorldComp'2010. 2010, pp 822-827, isbn 1-60132-146-5 1-60132-147-3 1-60132-148-1, 6 p.Conference Paper

Anon-Pass: Practical Anonymous SubscriptionsLEE, Michael Z; DUNN, Alan M; KATZ, Jonathan et al.IEEE security & privacy. 2014, Vol 12, Num 3, pp 20-27, issn 1540-7993, 8 p.Conference Paper

A Decade of OS Access-Control ExtensibilityWATSON, Robert N. M.Communications of the ACM. 2013, Vol 56, Num 2, pp 52-63, issn 0001-0782, 12 p.Article

Interleaving tasks to improve performance: Users maximise the marginal rate of returnDUGGAN, Geoffrey B; JOHNSON, Hilary; SØRLI, Petter et al.International journal of human-computer studies. 2013, Vol 71, Num 5, pp 533-550, issn 1071-5819, 18 p.Article

A Distributed Access Control Architecture for Cloud Computing : CLOUD COMPUTINGALMUTAIRI, Abdulrahman A; SARFRAZ, Muhammad I; BASALAMAH, Saleh et al.IEEE software. 2012, Vol 29, Num 2, pp 36-44, issn 0740-7459, 9 p.Article

  • Page / 19